On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols'

被引:0
|
作者
Yuen, Horace P. [1 ]
Nair, Ranjith [1 ]
Corndorf, Eric [1 ]
Kanter, Gregory S. [1 ]
Kumar, Prem [1 ]
机构
[1] Center for Photonic Communication and Computing, Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL 60208, United States
来源
Quantum Information and Computation | 2006年 / 6卷 / 07期
关键词
26;
D O I
10.26421/qic6.7-1
中图分类号
学科分类号
摘要
引用
收藏
页码:561 / 582
相关论文
共 50 条
  • [1] On the security of αη:: Response to 'some attacks on quantum-based cryptographic protocols'
    Yuen, Horace P.
    Nair, Ranjith
    Corndorf, Eric
    Kanter, Gregory S.
    Kumar, Prem
    QUANTUM INFORMATION & COMPUTATION, 2006, 6 (07) : 561 - 582
  • [2] Some attacks on quantum-based cryptographic protocols
    Lo, HK
    Ko, TM
    QUANTUM INFORMATION & COMPUTATION, 2005, 5 (01) : 41 - 48
  • [3] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [4] Quantum Communication Attacks on Classical Cryptographic Protocols
    Damgard, Ivan
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181
  • [5] A quantum-based approach for offensive security against cyber attacks in electrical infrastructure
    Lakshmi, D.
    Nagpal, Neelu
    Chandrasekaran, S.
    Hemanth, D. Jude
    APPLIED SOFT COMPUTING, 2023, 136
  • [6] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [7] Quantum communication attacks on classical cryptographic protocols: (invited talk)
    Damgård, Ivan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
  • [8] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
  • [9] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [10] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63